2016-01-06 21:26:29 -07:00
|
|
|
# Copyright 2014-2016 OpenMarket Ltd
|
2014-09-29 07:59:52 -06:00
|
|
|
#
|
|
|
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
# you may not use this file except in compliance with the License.
|
|
|
|
# You may obtain a copy of the License at
|
|
|
|
#
|
|
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
#
|
|
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
|
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
# See the License for the specific language governing permissions and
|
|
|
|
# limitations under the License.
|
|
|
|
|
2020-12-29 15:42:10 -07:00
|
|
|
import abc
|
2018-07-09 00:09:20 -06:00
|
|
|
import logging
|
2023-09-18 07:55:04 -06:00
|
|
|
from typing import TYPE_CHECKING, Any, Dict, List, Mapping, Optional, Sequence, Set
|
2018-07-09 00:09:20 -06:00
|
|
|
|
2023-10-11 18:08:11 -06:00
|
|
|
import attr
|
|
|
|
|
2023-01-27 05:27:55 -07:00
|
|
|
from synapse.api.constants import Direction, Membership
|
2020-12-29 15:42:10 -07:00
|
|
|
from synapse.events import EventBase
|
2023-09-18 07:55:04 -06:00
|
|
|
from synapse.types import JsonMapping, RoomStreamToken, StateMap, UserID, UserInfo
|
2019-07-01 10:55:11 -06:00
|
|
|
from synapse.visibility import filter_events_for_client
|
|
|
|
|
2020-12-29 15:42:10 -07:00
|
|
|
if TYPE_CHECKING:
|
2021-03-23 05:12:48 -06:00
|
|
|
from synapse.server import HomeServer
|
2020-12-29 15:42:10 -07:00
|
|
|
|
2014-09-29 07:59:52 -06:00
|
|
|
logger = logging.getLogger(__name__)
|
|
|
|
|
|
|
|
|
2021-10-08 05:44:43 -06:00
|
|
|
class AdminHandler:
|
2020-12-29 15:42:10 -07:00
|
|
|
def __init__(self, hs: "HomeServer"):
|
2023-02-17 06:54:55 -07:00
|
|
|
self._store = hs.get_datastores().main
|
2023-02-01 08:45:19 -07:00
|
|
|
self._device_handler = hs.get_device_handler()
|
2022-05-31 06:17:50 -06:00
|
|
|
self._storage_controllers = hs.get_storage_controllers()
|
|
|
|
self._state_storage_controller = self._storage_controllers.state
|
2022-09-29 07:23:24 -06:00
|
|
|
self._msc3866_enabled = hs.config.experimental.msc3866.enabled
|
2019-10-23 10:25:54 -06:00
|
|
|
|
2023-09-18 07:55:04 -06:00
|
|
|
async def get_whois(self, user: UserID) -> JsonMapping:
|
2015-12-02 10:27:49 -07:00
|
|
|
connections = []
|
|
|
|
|
2023-02-17 06:54:55 -07:00
|
|
|
sessions = await self._store.get_user_ip_and_agents(user)
|
2015-12-02 10:27:49 -07:00
|
|
|
for session in sessions:
|
|
|
|
connections.append(
|
|
|
|
{
|
|
|
|
"ip": session["ip"],
|
|
|
|
"last_seen": session["last_seen"],
|
|
|
|
"user_agent": session["user_agent"],
|
2014-09-29 07:59:52 -06:00
|
|
|
}
|
|
|
|
)
|
|
|
|
|
|
|
|
ret = {
|
|
|
|
"user_id": user.to_string(),
|
2015-12-02 10:27:49 -07:00
|
|
|
"devices": {"": {"sessions": [{"connections": connections}]}},
|
2014-09-29 07:59:52 -06:00
|
|
|
}
|
|
|
|
|
2019-07-23 07:00:55 -06:00
|
|
|
return ret
|
2017-02-02 06:02:26 -07:00
|
|
|
|
2023-09-18 07:55:04 -06:00
|
|
|
async def get_user(self, user: UserID) -> Optional[JsonMapping]:
|
2020-01-09 06:31:00 -07:00
|
|
|
"""Function to get user details"""
|
2023-09-14 05:46:30 -06:00
|
|
|
user_info: Optional[UserInfo] = await self._store.get_user_by_id(
|
|
|
|
user.to_string()
|
|
|
|
)
|
|
|
|
if user_info is None:
|
2022-01-14 07:53:33 -07:00
|
|
|
return None
|
|
|
|
|
2023-09-14 05:46:30 -06:00
|
|
|
user_info_dict = {
|
|
|
|
"name": user.to_string(),
|
|
|
|
"admin": user_info.is_admin,
|
|
|
|
"deactivated": user_info.is_deactivated,
|
|
|
|
"locked": user_info.locked,
|
|
|
|
"shadow_banned": user_info.is_shadow_banned,
|
|
|
|
"creation_ts": user_info.creation_ts,
|
|
|
|
"appservice_id": user_info.appservice_id,
|
|
|
|
"consent_server_notice_sent": user_info.consent_server_notice_sent,
|
|
|
|
"consent_version": user_info.consent_version,
|
|
|
|
"consent_ts": user_info.consent_ts,
|
|
|
|
"user_type": user_info.user_type,
|
|
|
|
"is_guest": user_info.is_guest,
|
2022-01-14 07:53:33 -07:00
|
|
|
}
|
|
|
|
|
2022-09-29 07:23:24 -06:00
|
|
|
if self._msc3866_enabled:
|
|
|
|
# Only include the approved flag if support for MSC3866 is enabled.
|
2023-09-14 05:46:30 -06:00
|
|
|
user_info_dict["approved"] = user_info.approved
|
2022-01-14 07:53:33 -07:00
|
|
|
|
|
|
|
# Add additional user metadata
|
2023-06-02 18:24:13 -06:00
|
|
|
profile = await self._store.get_profileinfo(user)
|
2023-02-17 06:54:55 -07:00
|
|
|
threepids = await self._store.user_get_threepids(user.to_string())
|
2022-01-14 07:53:33 -07:00
|
|
|
external_ids = [
|
|
|
|
({"auth_provider": auth_provider, "external_id": external_id})
|
2023-02-17 06:54:55 -07:00
|
|
|
for auth_provider, external_id in await self._store.get_external_ids_by_user(
|
2022-01-14 07:53:33 -07:00
|
|
|
user.to_string()
|
|
|
|
)
|
|
|
|
]
|
|
|
|
user_info_dict["displayname"] = profile.display_name
|
|
|
|
user_info_dict["avatar_url"] = profile.avatar_url
|
2023-10-11 18:08:11 -06:00
|
|
|
user_info_dict["threepids"] = [attr.asdict(t) for t in threepids]
|
2022-01-14 07:53:33 -07:00
|
|
|
user_info_dict["external_ids"] = external_ids
|
2023-02-17 06:54:55 -07:00
|
|
|
user_info_dict["erased"] = await self._store.is_user_erased(user.to_string())
|
2022-01-14 07:53:33 -07:00
|
|
|
|
2023-09-14 05:46:30 -06:00
|
|
|
last_seen_ts = await self._store.get_last_seen_for_user_id(user.to_string())
|
|
|
|
user_info_dict["last_seen_ts"] = last_seen_ts
|
|
|
|
|
2022-01-14 07:53:33 -07:00
|
|
|
return user_info_dict
|
2020-01-09 06:31:00 -07:00
|
|
|
|
2020-12-29 15:42:10 -07:00
|
|
|
async def export_user_data(self, user_id: str, writer: "ExfiltrationWriter") -> Any:
|
2019-07-03 08:03:38 -06:00
|
|
|
"""Write all data we have on the user to the given writer.
|
2019-07-01 10:55:11 -06:00
|
|
|
|
|
|
|
Args:
|
2020-12-29 15:42:10 -07:00
|
|
|
user_id: The user ID to fetch data of.
|
|
|
|
writer: The writer to write to.
|
2019-07-01 10:55:11 -06:00
|
|
|
|
|
|
|
Returns:
|
2020-07-24 08:53:25 -06:00
|
|
|
Resolves when all data for a user has been written.
|
2019-07-04 04:07:09 -06:00
|
|
|
The returned value is that returned by `writer.finished()`.
|
2019-07-01 10:55:11 -06:00
|
|
|
"""
|
|
|
|
# Get all rooms the user is in or has been in
|
2023-02-17 06:54:55 -07:00
|
|
|
rooms = await self._store.get_rooms_for_local_user_where_membership_is(
|
2019-07-01 10:55:11 -06:00
|
|
|
user_id,
|
|
|
|
membership_list=(
|
|
|
|
Membership.JOIN,
|
|
|
|
Membership.LEAVE,
|
|
|
|
Membership.BAN,
|
|
|
|
Membership.INVITE,
|
2021-10-28 11:54:38 -06:00
|
|
|
Membership.KNOCK,
|
2019-07-01 10:55:11 -06:00
|
|
|
),
|
|
|
|
)
|
|
|
|
|
|
|
|
# We only try and fetch events for rooms the user has been in. If
|
|
|
|
# they've been e.g. invited to a room without joining then we handle
|
2020-10-23 10:38:40 -06:00
|
|
|
# those separately.
|
2023-02-17 06:54:55 -07:00
|
|
|
rooms_user_has_been_in = await self._store.get_rooms_user_has_been_in(user_id)
|
2019-07-01 10:55:11 -06:00
|
|
|
|
|
|
|
for index, room in enumerate(rooms):
|
|
|
|
room_id = room.room_id
|
|
|
|
|
|
|
|
logger.info(
|
|
|
|
"[%s] Handling room %s, %d/%d", user_id, room_id, index + 1, len(rooms)
|
|
|
|
)
|
|
|
|
|
2023-02-17 06:54:55 -07:00
|
|
|
forgotten = await self._store.did_forget(user_id, room_id)
|
2019-07-01 10:55:11 -06:00
|
|
|
if forgotten:
|
2019-07-04 04:07:09 -06:00
|
|
|
logger.info("[%s] User forgot room %d, ignoring", user_id, room_id)
|
2019-07-01 10:55:11 -06:00
|
|
|
continue
|
|
|
|
|
|
|
|
if room_id not in rooms_user_has_been_in:
|
|
|
|
# If we haven't been in the rooms then the filtering code below
|
|
|
|
# won't return anything, so we need to handle these cases
|
|
|
|
# explicitly.
|
|
|
|
|
|
|
|
if room.membership == Membership.INVITE:
|
|
|
|
event_id = room.event_id
|
2023-02-17 06:54:55 -07:00
|
|
|
invite = await self._store.get_event(event_id, allow_none=True)
|
2019-07-01 10:55:11 -06:00
|
|
|
if invite:
|
|
|
|
invited_state = invite.unsigned["invite_room_state"]
|
|
|
|
writer.write_invite(room_id, invite, invited_state)
|
|
|
|
|
2021-10-28 11:54:38 -06:00
|
|
|
if room.membership == Membership.KNOCK:
|
|
|
|
event_id = room.event_id
|
2023-02-17 06:54:55 -07:00
|
|
|
knock = await self._store.get_event(event_id, allow_none=True)
|
2021-10-28 11:54:38 -06:00
|
|
|
if knock:
|
|
|
|
knock_state = knock.unsigned["knock_room_state"]
|
|
|
|
writer.write_knock(room_id, knock, knock_state)
|
|
|
|
|
2019-07-01 10:55:11 -06:00
|
|
|
continue
|
|
|
|
|
|
|
|
# We only want to bother fetching events up to the last time they
|
|
|
|
# were joined. We estimate that point by looking at the
|
|
|
|
# stream_ordering of the last membership if it wasn't a join.
|
|
|
|
if room.membership == Membership.JOIN:
|
2023-02-17 06:54:55 -07:00
|
|
|
stream_ordering = self._store.get_room_max_stream_ordering()
|
2019-07-01 10:55:11 -06:00
|
|
|
else:
|
|
|
|
stream_ordering = room.stream_ordering
|
|
|
|
|
2023-10-05 03:46:28 -06:00
|
|
|
from_key = RoomStreamToken(topological=0, stream=0)
|
|
|
|
to_key = RoomStreamToken(stream=stream_ordering)
|
2019-07-01 10:55:11 -06:00
|
|
|
|
2020-12-29 15:42:10 -07:00
|
|
|
# Events that we've processed in this room
|
2021-07-16 11:22:36 -06:00
|
|
|
written_events: Set[str] = set()
|
2019-07-01 10:55:11 -06:00
|
|
|
|
|
|
|
# We need to track gaps in the events stream so that we can then
|
|
|
|
# write out the state at those events. We do this by keeping track
|
|
|
|
# of events whose prev events we haven't seen.
|
|
|
|
|
|
|
|
# Map from event ID to prev events that haven't been processed,
|
|
|
|
# dict[str, set[str]].
|
|
|
|
event_to_unseen_prevs = {}
|
|
|
|
|
2019-07-04 04:07:09 -06:00
|
|
|
# The reverse mapping to above, i.e. map from unseen event to events
|
|
|
|
# that have the unseen event in their prev_events, i.e. the unseen
|
2020-12-29 15:42:10 -07:00
|
|
|
# events "children".
|
2021-07-16 11:22:36 -06:00
|
|
|
unseen_to_child_events: Dict[str, Set[str]] = {}
|
2019-07-01 10:55:11 -06:00
|
|
|
|
|
|
|
# We fetch events in the room the user could see by fetching *all*
|
|
|
|
# events that we have and then filtering, this isn't the most
|
2019-07-03 08:03:38 -06:00
|
|
|
# efficient method perhaps but it does guarantee we get everything.
|
2019-07-01 10:55:11 -06:00
|
|
|
while True:
|
2023-02-17 06:54:55 -07:00
|
|
|
events, _ = await self._store.paginate_room_events(
|
2023-01-27 05:27:55 -07:00
|
|
|
room_id, from_key, to_key, limit=100, direction=Direction.FORWARDS
|
2019-07-01 10:55:11 -06:00
|
|
|
)
|
|
|
|
if not events:
|
|
|
|
break
|
|
|
|
|
2020-09-29 14:48:33 -06:00
|
|
|
from_key = events[-1].internal_metadata.after
|
2019-07-01 10:55:11 -06:00
|
|
|
|
2022-05-31 06:17:50 -06:00
|
|
|
events = await filter_events_for_client(
|
|
|
|
self._storage_controllers, user_id, events
|
|
|
|
)
|
2019-07-01 10:55:11 -06:00
|
|
|
|
|
|
|
writer.write_events(room_id, events)
|
|
|
|
|
|
|
|
# Update the extremity tracking dicts
|
|
|
|
for event in events:
|
|
|
|
# Check if we have any prev events that haven't been
|
|
|
|
# processed yet, and add those to the appropriate dicts.
|
|
|
|
unseen_events = set(event.prev_event_ids()) - written_events
|
|
|
|
if unseen_events:
|
|
|
|
event_to_unseen_prevs[event.event_id] = unseen_events
|
|
|
|
for unseen in unseen_events:
|
2019-07-04 04:07:09 -06:00
|
|
|
unseen_to_child_events.setdefault(unseen, set()).add(
|
2019-07-01 10:55:11 -06:00
|
|
|
event.event_id
|
|
|
|
)
|
|
|
|
|
|
|
|
# Now check if this event is an unseen prev event, if so
|
|
|
|
# then we remove this event from the appropriate dicts.
|
2019-07-04 04:07:09 -06:00
|
|
|
for child_id in unseen_to_child_events.pop(event.event_id, []):
|
2019-07-05 07:07:56 -06:00
|
|
|
event_to_unseen_prevs[child_id].discard(event.event_id)
|
2019-07-01 10:55:11 -06:00
|
|
|
|
|
|
|
written_events.add(event.event_id)
|
|
|
|
|
|
|
|
logger.info(
|
|
|
|
"Written %d events in room %s", len(written_events), room_id
|
|
|
|
)
|
|
|
|
|
|
|
|
# Extremities are the events who have at least one unseen prev event.
|
|
|
|
extremities = (
|
|
|
|
event_id
|
|
|
|
for event_id, unseen_prevs in event_to_unseen_prevs.items()
|
|
|
|
if unseen_prevs
|
|
|
|
)
|
|
|
|
for event_id in extremities:
|
|
|
|
if not event_to_unseen_prevs[event_id]:
|
|
|
|
continue
|
2022-05-31 06:17:50 -06:00
|
|
|
state = await self._state_storage_controller.get_state_for_event(
|
|
|
|
event_id
|
|
|
|
)
|
2019-07-01 10:55:11 -06:00
|
|
|
writer.write_state(room_id, event_id, state)
|
|
|
|
|
2023-02-01 08:45:19 -07:00
|
|
|
# Get the user profile
|
|
|
|
profile = await self.get_user(UserID.from_string(user_id))
|
|
|
|
if profile is not None:
|
|
|
|
writer.write_profile(profile)
|
2023-02-23 11:14:17 -07:00
|
|
|
logger.info("[%s] Written profile", user_id)
|
2023-02-01 08:45:19 -07:00
|
|
|
|
|
|
|
# Get all devices the user has
|
|
|
|
devices = await self._device_handler.get_devices_by_user(user_id)
|
|
|
|
writer.write_devices(devices)
|
2023-02-23 11:14:17 -07:00
|
|
|
logger.info("[%s] Written %s devices", user_id, len(devices))
|
2023-02-01 08:45:19 -07:00
|
|
|
|
|
|
|
# Get all connections the user has
|
|
|
|
connections = await self.get_whois(UserID.from_string(user_id))
|
|
|
|
writer.write_connections(
|
|
|
|
connections["devices"][""]["sessions"][0]["connections"]
|
|
|
|
)
|
2023-02-23 11:14:17 -07:00
|
|
|
logger.info("[%s] Written %s connections", user_id, len(connections))
|
2023-02-01 08:45:19 -07:00
|
|
|
|
2023-02-17 06:54:55 -07:00
|
|
|
# Get all account data the user has global and in rooms
|
|
|
|
global_data = await self._store.get_global_account_data_for_user(user_id)
|
|
|
|
by_room_data = await self._store.get_room_account_data_for_user(user_id)
|
|
|
|
writer.write_account_data("global", global_data)
|
|
|
|
for room_id in by_room_data:
|
|
|
|
writer.write_account_data(room_id, by_room_data[room_id])
|
2023-02-23 11:14:17 -07:00
|
|
|
logger.info(
|
|
|
|
"[%s] Written account data for %s rooms", user_id, len(by_room_data)
|
|
|
|
)
|
|
|
|
|
|
|
|
# Get all media ids the user has
|
|
|
|
limit = 100
|
|
|
|
start = 0
|
|
|
|
while True:
|
|
|
|
media_ids, total = await self._store.get_local_media_by_user_paginate(
|
|
|
|
start, limit, user_id
|
|
|
|
)
|
|
|
|
for media in media_ids:
|
|
|
|
writer.write_media_id(media["media_id"], media)
|
|
|
|
|
|
|
|
logger.info(
|
|
|
|
"[%s] Written %d media_ids of %s",
|
|
|
|
user_id,
|
|
|
|
(start + len(media_ids)),
|
|
|
|
total,
|
|
|
|
)
|
|
|
|
if (start + limit) >= total:
|
|
|
|
break
|
|
|
|
start += limit
|
2023-02-17 06:54:55 -07:00
|
|
|
|
2019-07-23 07:00:55 -06:00
|
|
|
return writer.finished()
|
2019-07-01 10:55:11 -06:00
|
|
|
|
|
|
|
|
2020-12-29 15:42:10 -07:00
|
|
|
class ExfiltrationWriter(metaclass=abc.ABCMeta):
|
2019-07-04 04:07:09 -06:00
|
|
|
"""Interface used to specify how to write exported data."""
|
2019-07-01 10:55:11 -06:00
|
|
|
|
2020-12-29 15:42:10 -07:00
|
|
|
@abc.abstractmethod
|
|
|
|
def write_events(self, room_id: str, events: List[EventBase]) -> None:
|
2019-07-01 10:55:11 -06:00
|
|
|
"""Write a batch of events for a room."""
|
2020-12-29 15:42:10 -07:00
|
|
|
raise NotImplementedError()
|
2019-07-01 10:55:11 -06:00
|
|
|
|
2020-12-29 15:42:10 -07:00
|
|
|
@abc.abstractmethod
|
|
|
|
def write_state(
|
|
|
|
self, room_id: str, event_id: str, state: StateMap[EventBase]
|
|
|
|
) -> None:
|
2019-07-01 10:55:11 -06:00
|
|
|
"""Write the state at the given event in the room.
|
|
|
|
|
|
|
|
This only gets called for backward extremities rather than for each
|
|
|
|
event.
|
|
|
|
"""
|
2020-12-29 15:42:10 -07:00
|
|
|
raise NotImplementedError()
|
2019-07-01 10:55:11 -06:00
|
|
|
|
2020-12-29 15:42:10 -07:00
|
|
|
@abc.abstractmethod
|
|
|
|
def write_invite(
|
2021-11-10 13:06:54 -07:00
|
|
|
self, room_id: str, event: EventBase, state: StateMap[EventBase]
|
2020-12-29 15:42:10 -07:00
|
|
|
) -> None:
|
2019-07-01 10:55:11 -06:00
|
|
|
"""Write an invite for the room, with associated invite state.
|
|
|
|
|
|
|
|
Args:
|
2020-12-29 15:42:10 -07:00
|
|
|
room_id: The room ID the invite is for.
|
|
|
|
event: The invite event.
|
|
|
|
state: A subset of the state at the invite, with a subset of the
|
|
|
|
event keys (type, state_key content and sender).
|
2019-07-01 10:55:11 -06:00
|
|
|
"""
|
2020-12-29 15:42:10 -07:00
|
|
|
raise NotImplementedError()
|
2019-07-01 10:55:11 -06:00
|
|
|
|
2021-10-28 11:54:38 -06:00
|
|
|
@abc.abstractmethod
|
|
|
|
def write_knock(
|
2021-11-10 13:06:54 -07:00
|
|
|
self, room_id: str, event: EventBase, state: StateMap[EventBase]
|
2021-10-28 11:54:38 -06:00
|
|
|
) -> None:
|
|
|
|
"""Write a knock for the room, with associated knock state.
|
|
|
|
|
|
|
|
Args:
|
|
|
|
room_id: The room ID the knock is for.
|
|
|
|
event: The knock event.
|
|
|
|
state: A subset of the state at the knock, with a subset of the
|
|
|
|
event keys (type, state_key content and sender).
|
|
|
|
"""
|
|
|
|
raise NotImplementedError()
|
|
|
|
|
2023-02-01 08:45:19 -07:00
|
|
|
@abc.abstractmethod
|
2023-09-18 07:55:04 -06:00
|
|
|
def write_profile(self, profile: JsonMapping) -> None:
|
2023-02-01 08:45:19 -07:00
|
|
|
"""Write the profile of a user.
|
|
|
|
|
|
|
|
Args:
|
|
|
|
profile: The user profile.
|
|
|
|
"""
|
|
|
|
raise NotImplementedError()
|
|
|
|
|
|
|
|
@abc.abstractmethod
|
2023-09-18 07:55:04 -06:00
|
|
|
def write_devices(self, devices: Sequence[JsonMapping]) -> None:
|
2023-02-01 08:45:19 -07:00
|
|
|
"""Write the devices of a user.
|
|
|
|
|
|
|
|
Args:
|
|
|
|
devices: The list of devices.
|
|
|
|
"""
|
|
|
|
raise NotImplementedError()
|
|
|
|
|
|
|
|
@abc.abstractmethod
|
2023-09-18 07:55:04 -06:00
|
|
|
def write_connections(self, connections: Sequence[JsonMapping]) -> None:
|
2023-02-01 08:45:19 -07:00
|
|
|
"""Write the connections of a user.
|
|
|
|
|
|
|
|
Args:
|
|
|
|
connections: The list of connections / sessions.
|
|
|
|
"""
|
|
|
|
raise NotImplementedError()
|
|
|
|
|
2023-02-17 06:54:55 -07:00
|
|
|
@abc.abstractmethod
|
|
|
|
def write_account_data(
|
2023-09-18 07:55:04 -06:00
|
|
|
self, file_name: str, account_data: Mapping[str, JsonMapping]
|
2023-02-17 06:54:55 -07:00
|
|
|
) -> None:
|
|
|
|
"""Write the account data of a user.
|
|
|
|
|
|
|
|
Args:
|
|
|
|
file_name: file name to write data
|
|
|
|
account_data: mapping of global or room account_data
|
|
|
|
"""
|
|
|
|
raise NotImplementedError()
|
|
|
|
|
2023-02-23 11:14:17 -07:00
|
|
|
@abc.abstractmethod
|
2023-09-18 07:55:04 -06:00
|
|
|
def write_media_id(self, media_id: str, media_metadata: JsonMapping) -> None:
|
2023-02-23 11:14:17 -07:00
|
|
|
"""Write the media's metadata of a user.
|
|
|
|
Exports only the metadata, as this can be fetched from the database via
|
|
|
|
read only. In order to access the files, a connection to the correct
|
|
|
|
media repository would be required.
|
|
|
|
|
|
|
|
Args:
|
|
|
|
media_id: ID of the media.
|
|
|
|
media_metadata: Metadata of one media file.
|
|
|
|
"""
|
|
|
|
|
2020-12-29 15:42:10 -07:00
|
|
|
@abc.abstractmethod
|
|
|
|
def finished(self) -> Any:
|
2020-10-23 10:38:40 -06:00
|
|
|
"""Called when all data has successfully been exported and written.
|
2019-07-04 04:07:09 -06:00
|
|
|
|
|
|
|
This functions return value is passed to the caller of
|
|
|
|
`export_user_data`.
|
2019-07-01 10:55:11 -06:00
|
|
|
"""
|
2020-12-29 15:42:10 -07:00
|
|
|
raise NotImplementedError()
|